Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Thirteen Channel Coding and Encryption
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Square array for error correction by parity checking Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Interleaved check bits for error control with burst errors Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. FEC system Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. ARQ system Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. ARQ schemes (a) stop-and-wait (b) go-back (c) selective repeat Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Convolutional encoder with n=2, k=1, and L=2 Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. (a) Code trellis (b) state diagram for (2, 1, 2) encoder (c) illustrative sequence Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Termination of (2, 1, 2) code trellis Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Encoder subject to catastrophic error propagation (a) encoder (b) state diagram Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Illustration of the Viterbi algorithm for maximum- likelihood decoding Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Turbo encoder Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. RSC encoder with Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Turbo decoder Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Secret key system Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Public/private key system Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Permutation examples (a) straight (b) expanded (c) compressed Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. S-box example Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. DES flowchart Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Substitute and permute block Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key generator flowchart Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 32 to 48 bit expansion Figure
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Details of 48 to 32-bit S-box Figure